July, 2018

article thumbnail

Accuracy and Trust in Machine Learning

Eric D. Brown

A few weeks ago, I wrote about machine learning risks where I described four ‘buckets’ of risk that needed to be understood and mitigated when you have machine learning initiatives. One major risk that I *should* have mentioned explicitly is the risk of accuracy and trust in machine learning. While I tend to throw this risk into the “Lack of model variability” bucket, it probably deserves to be in a bucket all its own or, at the very least, it needs to be discussed.

Training 124
article thumbnail

Seeking Magic Moments – Why It’s Time to Tune Up Your Digital Experience Stack

Forrester IT

The legendary R&B singer and songwriter Ben E. King got it so right in the Drifters 1960 recording of “This Magic Moment.” The song is timeless because it tells a classic tale of a first kiss. And also captures a moment in time in words and song that reminds us of the power of storytelling, […].

B2C 580
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

6 must-have skills of modern web application developers

mrc's Cup of Joe Blog

Summary: Web application development is quickly becoming more complex. It requires an ever-increasing, and ever-evolving skill-set. What skills must modern web application developers now possess? We explore the top 6 in this article. photo credit: geralt via pixabay cc In the past, application development had more of a specialized focus. Programmers focused on a single language (like COBOL, RPG, C++, etc.), and built applications with that language.

article thumbnail

Smart Cities Cybersecurity Challenge

CTOvision

Smart Cities will become a full-scale cyber war battleground unless Congress mandates cybersecurity. The biggest danger in Smart Cities is the assumption that IoT sensors communicating over a 5G fabric to Machine Learning and Blockchain systems will be safe from cyberattacks. To the contrary Smart Cities suffer from all the cyber vulnerabilities we have today [.].

System 343
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

What is Data Governance? Data practices that address risk and drive opportunities

Social, Agile and Transformation

I don't like the term 'data governance'. People - and especially leaders don't know what it means and often put up mental walls whenever they hear the word 'governance'. Governance is bureaucratic. It slows organizations down and creates tension. Why would anyone want to back a governance initiative especially one tied to data? But anyone leading data efforts knows data governance is a long.

article thumbnail

Learning How to Learn SCCM Intune Azure

Anoop

I still get many queries similar to “How to Start Learning SCCM Intune Azure” or “How to Learn Intune” or “How to become an expert in SCCM” or “What is the future of SCCM/ ConfigMgr”. I didn’t do much research on these topics. So my opinions could be wrong. In this post, I will provide some […]. The post Learning How to Learn SCCM Intune Azure appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

How To 161

More Trending

article thumbnail

Making Journey Maps Useful: CX Measurement Edition

Forrester IT

Of course you should use journey maps to define CX metrics — it’s the only way to define outside-in CX metrics that: Capture important pain or peak points. Measure the right CX drivers. Align operational metrics with customers’ expectations (e.g., how you measure delivery times). But why are only 39% of CX pros using journey maps […].

Course 470
article thumbnail

Go – On The Shoulders of Giants

SPF13

This presentation was developed for Curry On and delivered as the closing keynote of the conference. The presentation describes the many inspirations and influences of the Go programming language and goes into detail about how we shaped and created the language.

article thumbnail

Blockchain in Plain English

CTOvision

We hear a lot about Blockchain these days, but how many people know what it's really about? In an attempt to make this definition as simple as possible, blockchain automates trust. It’s a software architecture that allows non-trusting parties to record transactions without requiring a trusted governing authority. In other words, it does away with [.].

article thumbnail

How to Prioritize DevOps Practices and What Applications to Apply Them

Social, Agile and Transformation

I'm not your typical DevOps evangelist. I don't believe continuous deployment is right for every business as it requires significant technical maturity to enable this level of automation. It's far more important for organizations to align their release management practices to business need and then prioritize the work on CI/CD that reduces the most manual, risky efforts tied to integrating.

Devops 150
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Fix – CMG Client Communication Failure Error 0x87d0027e

Anoop

Cloud Management Gateway (CMG) is the most talked feature these days as it became a full release feature from SCCM CB 1802 onwards. If you are looking for the deployment steps, CMG Client communication post is not the right post and you can check the detailed tutorial by Anoop on this here. Content SCCM CMG […]. The post Fix – CMG Client Communication Failure Error 0x87d0027e appeared first on SCCM Intune Real World Enterprise Experience Blog by Rajul OS.

Cloud 138
article thumbnail

CIOs Learn To Deal With Quantum Computers

The Accidental Successful CIO

Quantum Computers have almost arrived, now what? Image Credit: Steve Jurvetson. So just exactly what does any of us know about the field of quantum mechanics? If you’ve done some science fiction reading, then by now you probably know that quantum mechanics talks about a particle can exist in more than one state all at the same time. Additionally, there is the property that Einstein called “spooky” where quantum particles are able to communicate with each other over vast distanc

article thumbnail

Empower Autonomous Teams To Accelerate Digital Delivery

Forrester IT

The need for speed has never been greater. Empowered customers are fickle. Big tech is disintermediating you. Disruptors lurk in the darkest corners of your markets, ready to rise kraken-like to swallow your floundering ship whole. Your prospects are bleak. A depressing way to end the week? Perhaps not. Speed of execution is more vital […].

article thumbnail

Digital Maturity or Digital Transformation?

Eric D. Brown

Everyone’s working on digital transformation projects. Much like ‘big data’ or ‘machine learning’, digital transformation is a phrase that you hear every day across just about every organization. The problem with digital transformation is that its not the end goal… you don’t set a goal of ‘being transformed’ especially when you’re looking at the digital space.

Survey 113
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

C³ Webinar: Awareness Briefings on Russian Activity Against Critical Infrastructure

CTOvision

The Department of Homeland Security (DHS) Stakeholder Engagement and Cyber Infrastructure Resilience (SECIR) division and the National Cybersecurity and Communications Integration Center (NCCIC) are joining forces to conduct a series of unclassified, virtual awareness briefings on Russian government cyber activity against critical infrastructure. We believe this webinar will be of interest to technical teams operating [.].

article thumbnail

???Go, a global phenomenon (????)

SPF13

This presentation was given in ??? China, July 2018 as part of the InfoQ ArchSummit conference. It covers why Go was created and it’s impact across the globe.

article thumbnail

Cleaning Up and Automating the Backup of Bitlocker Passwords to Active Directory

Mick's IT Blog

Recently, I was reviewing the bitlocker recovery password backups. We still use active directory to store them, and yes, we are planning on moving to MBAM. That is a ways off as we're in the process of the Windows 10, Exchange 2016, and Office 2016 migrations. While looking over the AD backups, I noticed some machines stored multiple recovery passwords due to systems being reimaged and then some had duplicates.

Backup 109
article thumbnail

Fix – SCCM 1802 Known Issues

Anoop

Microsoft released a couple of update rollups and hotfixes for the latest production version of SCCM 1802. In this post, we will see the SCCM 1802 known issues and how to fix those known issues. The Video tutorial will help you to understand which update rollup you want to install in your SCCM 1802 environment and […]. The post Fix – SCCM 1802 Known Issues appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

How To 117
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Five Myths Of Digital Transformation

Forrester IT

Since I first wrote about digital transformation back at the end of 2012, the term has become wildly overhyped. Since CEOs are now at least asking about digital transformation, and every technology vendor now claims expertise in digital transformation, it’s time to burst a few of the myths surrounding digital transformation. But first, let’s recap […].

Strategy 263
article thumbnail

Could Budget Sweeps Fix Your Cybersecurity Problem?

Cloud Musings

A recent roundtable discussion in Washington, DC with Federal IT and Cyber leaders focused on the business drivers, challenges and evolving strategies around cybersecurity in government. After an opening presentation by Jim Quinn, the lead systems engineer for the Continuous Diagnostics and Mitigation program at the Department of Homeland Security, the discussion highlighted the need for data security.

Budget 112
article thumbnail

What Is DNSSEC and Why Is It Important?

CTOvision

Meta description: DNSSEC is an essential part of modern enterprise DNS security. We discuss how DNSSEC contributes to security and privacy for your business, its communications, and its customers. What Is DNSSEC and Why Is It Important? The Domain Name System (DNS) is responsible for converting URLs like www.example.com into IP addresses like 192.0.2.123.

Security 186
article thumbnail

While no one was looking, California passed its own GDPR

Network World

The European Union’s General Data Protection Regulation (GDPR) is widely viewed as a massively expensive and burdensome privacy regulation that can be a major headache and pitfall for American firms doing business in Europe. Many firms, including Facebook, have sought ways around the law to avoid having to deal with the burden of compliance. Well, there is no weaseling out now.

Data 115
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Lottery Run on Blockchain

Galido

Information Technology Blog - - The Lottery Run on Blockchain - Information Technology Blog. ETH93 is a lottery game running off the Ethereum blockchain. Every day, a lottery is held, and a random number is generated to determine the winner. The smart contract behind ETH93 is completely transparent, unlike other lotteries in which users have no idea what happens to their money.

Internet 113
article thumbnail

Windows Enrollment Status Screen Troubleshooting

Anoop

Intune Enrollment status screen (or page) is new to some of us. Enrollment status page policy is a global policy and once enabled it’s applicable for all the users. I hope Microsoft will give us options to deploy different enrollment status screen policies to a different set of users. In this post, we will see […]. The post Windows Enrollment Status Screen Troubleshooting appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

Windows 116
article thumbnail

Forrester’s Top Emerging Technologies To Watch 2018

Forrester IT

I’m excited to announce that our list of top emerging technologies to watch in 2018 is out. If you are a client, you can download the report here; if not, here is a quick video blog. It explains what’s different about this year’s report and how we came up with our list. It further contains […].

Video 245
article thumbnail

Accessing MDT and SCCM Task Sequence Variables

Mick's IT Blog

While rewriting a PowerShell automation script to move machines in Active Directory, I had been trying to pass the MachineObjectOU task sequence variable to the PowerShell script within the command line task sequence. It constantly failed. I finally put in a cmd.exe task sequence to pause the build and allow me to interact directly with the task sequence.

101
101
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

The digital workspace is fundamental to transformation

CTOvision

The digital workspace is shaping the way we will work in the future, providing increasingly flexible work practices. Collaboration is central to its success in the long term, allowing organizations to capture good ideas and exploit efficient work processes. Organizations are today digitizing themselves to meet the needs of a connected world. Providing employees with [.].

Meeting 182
article thumbnail

Cloud Migration Best Practice: Classifying Your Data

Cloud Musings

In my first post of this series, “CloudMigration Part One: An Overview,” I provided a high-level summary of how enterprises should migrate applications to the cloud. In this installment, the focus is on enterprise data and why your organization may need to review and reclassify its data before moving anything to the cloud. Cloud computing has done more than change the way enterprises consume information technology.

Cloud 99
article thumbnail

5 Ways to Find Insp?ration for Writ?ng a Blog Article or Book

Galido

Information Technology Blog - - 5 Ways to Find Insp?ration for Writ?ng a Blog Article or Book - Information Technology Blog. Do not wait for ?nspiration. It will ?ome in a process. Any creative person knows that there w?ll always be days when inspiration leaves him. It’s good if creativity is just a hobby; in this case, you can wait for the tide of the necessary ideas and emotions.

Film 111
article thumbnail

Video Review of Automation SCCM Documentation Script

Anoop

How to Document SCCM Settings every month? This post is a quick post to give a review of SCCM documentation script. David’s script helped many of us from disasters. I have shared one of my experience in the following section. I have explained that in one of my previous post here. Content My Experience - […]. The post Video Review of Automation SCCM Documentation Script appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

Video 112
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.